Security Analyst focusing on incident response and threat intelligence for Infotree Global Solutions. Collaborating on investigations and proactive security analysis across the global enterprise environment.
Responsibilities
Support proactive threat hunting, threat intelligence, and incident response activities in collaboration with Senior Analysts
Execute hypothesis-driven threat hunts and investigative analysis across endpoint, identity, cloud, and network telemetry
Assist in assessing, investigating, and responding to high-priority security events under the guidance of senior analysts and management
Analyze adversary behavior using MITRE ATT&CK and current realworld threat activity
Partner with Vulnerability Management to apply threat intelligence to vulnerability prioritization, risk assessment, and remediation efforts
Contribute to exposure management by identifying misconfigurations, attack paths, and chained weaknesses across the environment
Help translate intelligence findings, hunt results, and exposure insights into actionable detection and response recommendations
Collaborate with SOC, Privacy, Legal, Compliance, IT, Vulnerability Management, and business stakeholders during investigations
Produce clear, well-structured documentation and investigation summaries for leadership and incident records
Requirements
3 years+ of experience in Threat Intelligence, Threat Hunting, or Incident Response roles
Demonstrated experience supporting investigations and proactive security analysis within enterprise environments
Strong hands-on experience with EDR platforms and SIEM / log analytics tools
Solid understanding of vulnerability exploitation, exposure management, and attack path analysis
Strong knowledge of adversary tradecraft, attacker behavior, and modern intrusion techniques
Ability to operate independently, think critically, and make sound decisions under pressure while collaborating with senior analysts
Strong written and verbal communication skills, with the ability to clearly document findings and explain technical issues to varied audiences
Bachelor’s degree in Cybersecurity, Computer Science, or a related field, or equivalent practical experience
Industry certifications are preferred but not required, including:
o GIAC (GCIA, GCIH, GCED, GCIR, GNFA, GCFA)
o Offensive Security (OSCP, OSCE)
o Red Team / Adversary Emulation (CRTO, CRTP, CRTA)
o Digital Forensics & Incident Response (GCFA, GNFA, CFCE, EnCE)
Senior Threat Intelligence Analyst working with Bupa's cybersecurity team. Focused on threat management and defensive strategies to enhance cyber security posture.
Senior Information Security Analyst at Field Nation leading SOC 2 and ISO 27001 compliance programs. Collaborating with teams to embed security and leverage AI in GRC workflows.
Analista de Ciberseguridad en CRG Solutions responsable de monitorear amenazas y gestionar vulnerabilidades en la organización. Identificación de riesgos y mejora continua de la postura de seguridad.
Compliance & Information Security Analyst at beqom managing GRC and TPRM functions. Overseeing client governance, risk, and compliance requests, and vendor due diligence at a SaaS company.
Senior Technical Expert in Cyber Defense Center at ZEISS analyzing global cyber threats. Collaborating with SOC, CIRT, and ensuring proactive defense strategies.
Information Security Analyst focusing on vulnerability research and data analysis at Flexera. Involves analyzing, verifying vulnerabilities, and maintaining high - quality content standards.
Oversee the testing lifecycle and provide cyber security solutions at Xcel Energy. Engage in various testing techniques and collaborate with teams to enhance quality practices.
Security Analyst II role at Deepwatch focusing on incident handling and cybersecurity analysis. Working with a team to improve security posture and customer experience in a hybrid environment.
Information Security Analyst II at West Bend handling security projects and collaboration with IT teams. Supporting security incidents and enhancing organizational information security policies.